{"id":13415,"date":"2024-05-11T07:00:00","date_gmt":"2024-05-11T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/spam-targeting-toncoin-holders-signal-concerns-and-other-cybersecurity-events\/"},"modified":"2024-05-11T07:00:00","modified_gmt":"2024-05-11T04:00:00","slug":"spam-targeting-toncoin-holders-signal-concerns-and-other-cybersecurity-events","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/spam-targeting-toncoin-holders-signal-concerns-and-other-cybersecurity-events\/","title":{"rendered":"Spam Targeting Toncoin Holders, Signal Concerns, and Other Cybersecurity Events"},"content":{"rendered":"<p>We have compiled the most significant cybersecurity news of the week.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Media reported spam-NFT attacks on TON holders.<\/li>\n<li>A tool has emerged to determine the location of Telegram users worldwide.<\/li>\n<li>Dorsey, Musk, Buterin, and Durov discussed the alleged connection between Signal and the US government.<\/li>\n<li>Dell announced a data breach potentially affecting 49 million customers.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>Media Report Spam-NFT Attacks on TON Holders<\/strong><\/h2>\n<p>For two weeks, attackers have been sending mass spam-NFTs to Toncoin (TON) holders. This was reported by the Telegram channel <a href=\"https:\/\/t.me\/d_code\/19140\">\u201cDurov\u2019s Code\u201d<\/a>.<\/p>\n<p>Some fraudulent tokens are sent under the guise of airdrops as part of Open League competitions. They contain links to phishing sites or QR codes. Authorizing and conducting transactions through them results in the loss of all funds in the wallet.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"702\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/telegram-cloud-photo-size-2-5330131268937047179-y-1024x702.jpg\" alt=\"telegram-cloud-photo-size-2-5330131268937047179-y\" class=\"wp-image-232642\" srcset=\"https:\/\/u1f987.com\/wp-content\/uploads\/telegram-cloud-photo-size-2-5330131268937047179-y-1024x702.jpg 1024w, https:\/\/u1f987.com\/wp-content\/uploads\/telegram-cloud-photo-size-2-5330131268937047179-y-300x206.jpg 300w, https:\/\/u1f987.com\/wp-content\/uploads\/telegram-cloud-photo-size-2-5330131268937047179-y-768x526.jpg 768w, https:\/\/u1f987.com\/wp-content\/uploads\/telegram-cloud-photo-size-2-5330131268937047179-y.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Telegram channel \u201cDurov\u2019s Code\u201d.<\/figcaption><\/figure>\n<p>Other NFTs appear as duplicates of anonymous numbers. Attempting to send them to any address results in an additional deduction of 1 TON to the attacker&#8217;s account, besides the commission. The NFT then returns to the wallet.<\/p>\n<p>\u201cDurov\u2019s Code\u201d suggested sending scam-NFTs to a <a href=\"https:\/\/getgemsru.helpscoutdocs.com\/article\/75-nft\">zero address<\/a> or to spam.ton. To avoid losing funds on commissions, unnecessary tokens can be hidden using the functionality in the Tonkeeper wallet or marketplaces like Getgems.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Tool Emerges to Determine Telegram Users&#8217; Location Worldwide<\/strong><\/h2>\n<p>Researcher Ivan Glinkin created the tool Close-Circuit Telegram Vision (CCTV), which shows the approximate physical location of Telegram users worldwide if they have the \u201cPeople Nearby\u201d feature enabled. This was reported by <a href=\"https:\/\/www.404media.co\/this-tool-shows-some-telegram-users-approximate-physical-location\/\">404 Media<\/a>.<\/p>\n<p>CCTV uses the Telegram <span data-descr=\"Application Programming Interface \u2014\u00a0\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\" class=\"old_tooltip\">API<\/span> associated with the Find People Nearby feature, taking custom latitude and longitude as input data.\u00a0<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-eu.googleusercontent.com\/7SvlL0zsOnLRvlz1ZXY41KqnNDLMaBFytgTVmvVjfQVeiDIVqpRULfWzxtm-mFWyfkQcgfX1sy5hOClZZZZU8f_t0o_gWDDyQqjPP4CDBiD8a2AixAX7-rht-NsAPLwIhy77ZiPRZW_jiH3nFvR6qu8\" alt=\"Spam Targeting Toncoin Holders, Signal Concerns, and Other Cybersecurity Events\"\/><figcaption class=\"wp-element-caption\">CCTV Interface. Source: Ivan Glinkin.<\/figcaption><\/figure>\n<p>According to a Telegram press service comment, the coordinates displayed by the CCTV tool are not the user&#8217;s real location, as \u201cdata on the server is approximated to 800 meters.\u201d They also reminded that the \u201cPeople Nearby\u201d feature is disabled by default in the messenger.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Dell Announces Data Breach Potentially Affecting 49 Million Customers<\/strong><\/h2>\n<p>Computer manufacturer Dell sent notifications to customers about a data breach resulting from a hack of the purchase information portal. This was reported by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dell-warns-of-data-breach-49-million-customers-allegedly-affected\/\">Bleeping Computer<\/a>.<\/p>\n<p>Compromised information includes:<\/p>\n<ul class=\"wp-block-list\">\n<li>name;<\/li>\n<li>physical address;<\/li>\n<li>information about Dell equipment and order details, including service tag, product description, order date, and relevant warranty information.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-eu.googleusercontent.com\/AK27EmHuSVaGowGQD__EDD19XsW9f9bPUTVJjwqggGEYltdqZ5NQ317MSttom2CbQ41yQRGOq1sYa6S4Cm2nT2dpOLCb_9RJvUmlKBFNCf5bTU1H0pKmL-QnQTDradVB6qmlJwC6ujZxXoYVKs3zD3g\" alt=\"Spam Targeting Toncoin Holders, Signal Concerns, and Other Cybersecurity Events\"\/><figcaption class=\"wp-element-caption\">Dell Letter. Source: Bleeping Computer.<\/figcaption><\/figure>\n<p>The company emphasized that the attacker did not gain access to financial or payment data, email addresses, or phone numbers. Dell is cooperating with law enforcement and third-party experts to investigate the incident. The number of affected users is not disclosed.<\/p>\n<p>Initial information about the alleged breach appeared on BreachForums <a href=\"https:\/\/dailydarkweb.net\/threat-actor-claims-sale-of-dell-database-containing-49-million-customer-records\/\">in late April<\/a>. According to the seller known as Menelik, the hacked purchase database from 2017 to 2024 contained information on 49 million customers.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-eu.googleusercontent.com\/UeypI-185MR-UJi-VPuiljPHuAQGBYDSIEJ9mAKdiA0VNSYEFuuvX9dcrucw7b-hU2u7dfB138Yr2TLI4o-7bfG8QbCW6RWuEwH3GVCzepUrC2txReUsd9VcWx1eFMASWeW3NuLPFzZW0zv01HBRGaM\" alt=\"Spam Targeting Toncoin Holders, Signal Concerns, and Other Cybersecurity Events\"\/><figcaption class=\"wp-element-caption\">Source: Daily Dark Web.<\/figcaption><\/figure>\n<p>In a comment to Bleeping Computer, the hacker <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dell-api-abused-to-steal-49-million-customer-records-in-data-breach\/\">stated<\/a> that they accessed the Dell portal for partners, resellers, and retailers by registering several accounts under fictitious company names.<\/p>\n<p>At the time of writing, the forum post has been deleted, which may indicate that the database was acquired by other attackers.\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>Dorsey, Musk, Buterin, and Durov Discuss Alleged Signal-US Government Ties<\/strong><\/h2>\n<p>City Journal <a href=\"https:\/\/www.city-journal.org\/article\/signals-katherine-maher-problem\">accused<\/a> the Signal messenger of ties with the US State Department. According to the media, the technology underlying the application was partially funded by a $3 million grant from the government-sponsored Open Technology Fund.\u00a0<\/p>\n<p>The current chair of the Signal Foundation board, Katherine Maher, previously oversaw digital initiatives related to the <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%90%D1%80%D0%B0%D0%B1%D1%81%D0%BA%D0%B0%D1%8F_%D0%B2%D0%B5%D1%81%D0%BD%D0%B0\">Arab Spring<\/a>, fought misinformation on Wikipedia, and advocated for online censorship and bans.\u00a0<\/p>\n<p>Signal Foundation President Meredith Whittaker previously held a senior position at Google and organized internal leftist campaigns that led to a <a href=\"https:\/\/www.nytimes.com\/2018\/11\/01\/technology\/google-walkout-sexual-harassment.html\">2018 strike<\/a> and subsequent policy changes on sexual harassment and hiring a diversity director.<\/p>\n<p>The article was commented on by several notable figures, including entrepreneurs <a href=\"https:\/\/twitter.com\/jack\/status\/1787895769183268948\">Jack Dorsey<\/a>, <a href=\"https:\/\/twitter.com\/elonmusk\/status\/1787908190799278360\">Elon Musk<\/a>, and Ethereum co-founder Vitalik Buterin. All expressed concern and unease.<\/p>\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\">\n<p lang=\"en\" dir=\"ltr\">Things like this are worrying.<\/p>\n<p>Freedom of speech is a sacred principle, not a cudgel to be selectively used against enemies.<\/p>\n<p>Freedom of speech is for reds. It&#8217;s for blues. It&#8217;s for Canadians. It&#8217;s for Palestinians. It&#8217;s for the rich and the poor. For the old and the young.<\/p>\n<p>The\u2026 <a href=\"https:\/\/t.co\/GD4L6UVURj\">pic.twitter.com\/GD4L6UVURj<\/a><\/p>\n<p>\u2014 vitalik.eth (@VitalikButerin) <a href=\"https:\/\/twitter.com\/VitalikButerin\/status\/1788117156715978840?ref_src=twsrc%5Etfw\">May 8, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Telegram founder Pavel Durov stated that all major US messengers use a unified encryption protocol, are not protected from government interference, and often leak private correspondence to American courts or media.<\/p>\n<p><script async src=\"https:\/\/telegram.org\/js\/telegram-widget.js?22\" data-telegram-post=\"durov\/274\" data-width=\"100%\"><\/script><\/p>\n<p>In response, Meredith Whittaker pointed to vulnerabilities in Telegram itself and mentioned Durov&#8217;s \u201cbehind-the-scenes\u201d cooperation with authorities.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Telegram is notoriously insecure and routinely cooperates with govs behind the scenes while talking a big game about speech and privacy. Even their limited opt-in (roll their own) encryption is sus. The more you know ?<\/p>\n<p>\u2014 Meredith Whittaker (@mer__edith) <a href=\"https:\/\/twitter.com\/mer__edith\/status\/1788687092106567694?ref_src=twsrc%5Etfw\">May 9, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2 class=\"wp-block-heading\"><strong>EU to Establish Unified Body for Telegram Oversight<\/strong><\/h2>\n<p>The Belgian Institute for Postal Services and Telecommunications (BIPT) will become the supervisory body responsible for Telegram&#8217;s operations in the EU. This was reported by the newspaper <a href=\"https:\/\/m.standaard.be\/cnt\/dmf20240505_96985357\">De Standaart<\/a>.\u00a0<\/p>\n<p>BIPT will moderate illegal content in the messenger under the Digital Services Act, which came into force in February.\u00a0<\/p>\n<p>The agency will handle complaints from European users about detected illegal content if the Telegram administration does not respond to a similar request.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Fraudulent Online Store Network Stole Credit Card Data from 850,000 People<\/strong><\/h2>\n<p>A large network of 75,000 fake online stores called BogusBazaar has been stealing credit card data from users since 2021. This was reported by Security Research Labs.<\/p>\n<p><iframe src=\"https:\/\/infosec.exchange\/@srlabs\/112403491531265492\/embed\" class=\"mastodon-embed\" style=\"max-width: 100%; border: 0\" width=\"400\" allowfullscreen=\"allowfullscreen\"><\/iframe><script src=\"https:\/\/assets.infosec.exchange\/embed.js\" async=\"async\"><\/script><\/p>\n<p>The scheme was run by cybercriminals from China. The obtained bank card information was subsequently resold by them on the dark web, allowing other attackers to make unauthorized online purchases.<\/p>\n<p>The number of victims exceeded 850,000 people. The majority of victims are concentrated in the US and Western Europe.<\/p>\n<p>Over three years, BogusBazaar allegedly processed fake purchases totaling about $50 million.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>The Zilliqa team restored blockchain operations after disruptions.<\/li>\n<li>A hacker returned 51 ETH to a user from the stolen $68 million.<\/li>\n<li>An Odessa resident lost $32,000 due to a fake deal on Binance.<\/li>\n<li>Ripple joined the DeRec Alliance asset recovery initiative.<\/li>\n<li>Binance helped arrest a suspect in ZKasino fraud.<\/li>\n<li>Creators of a fake Blockchain.com site received prison sentences.<\/li>\n<li>The identity of the LockBit ransomware program administrator was established.<\/li>\n<li>The Poloniex hacker moved funds for the first time.<\/li>\n<li>The CEO of zkSNACKs explained the reasons for closing CoinJoin.<\/li>\n<li>Cred executives were charged with $783 million fraud.<\/li>\n<li>Paolo Ardoino denied a user data leak from Bitfinex.<\/li>\n<li>Vinnik pleaded guilty to conspiracy to launder money through BTC-e.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>Weekend Reading Suggestions<\/strong><\/h2>\n<p>We explore the European AI regulation and why it has been criticized in terms of technological development and human rights compliance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have compiled the most significant cybersecurity news of the week. Media reported spam-NFT attacks on TON holders. A tool has emerged to determine the location of Telegram users worldwide. Dorsey, Musk, Buterin, and Durov discussed the alleged connection between Signal and the US government. Dell announced a data breach potentially affecting 49 million customers. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13414,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-13415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"35","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/13415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=13415"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/13415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/13414"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=13415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=13415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=13415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}